Investigating Students’ Intentions to Use ICT: A Comparison of Theoretical Models C Buabeng-Andoh, W Yaokumah, A Tarhini Education and Information Technologies 24 (1), 643-660, 2019 | 75 | 2019 |
Demographic Influences on E-Payment Services W Yaokumah, P Kumah, E Okai International Journal of E-Business Research (IJEBR) 13 (1), 43-63, 2017 | 71 | 2017 |
An empirical examination of the relationship between information security/business strategic alignment and information security governance domain areas W Yaokumah, S Brown Journal of Law and Governance 9 (2), 51–66-51–66, 2014 | 51 | 2014 |
SETA and Security Behavior - Mediating Role of Employee Relations, Monitoring, and Accountability W Yaokumah, D Walker, P Kumah Journal of Global Information Management (JGIM) 27 (2), 102-121, 2019 | 44 | 2019 |
Information security governance implementation within Ghanaian industry sectors - An empirical study W Yaokumah Journal of Information Management and Computer Security 22 (3), 235-250, 2014 | 34 | 2014 |
Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country W Yaokumah, R Amponsah International Journal of Enterprise Information Systems (IJEIS) 13 (1), 17-37, 2017 | 30 | 2017 |
The Role of Norms in Information Security Policy Compliance I Wiafe, FN Koranteng, A Wiafe, EN Obeng, W Yaokumah Information & Computer Security 28 (5), 743-761, 2020 | 28 | 2020 |
Information Technology Governance Barriers, Drivers, IT/Business Alignment, and Maturity in Ghanaian Universities W Yaokumah, S Brown, POM Adjei International Journal of Information Systems in the Service Sector (IJISSS …, 2015 | 27 | 2015 |
Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools W Yaokumah, S Brown, R Amponsah In 2015 Annual Global Conference on Information and Computer Technology IEEE …, 2015 | 26 | 2015 |
Using Deep Learning for Acoustic Event Classification: The Case of Natural Disasters AO Ekpezu, I Wiafe, F Katsriku, W Yaokumah The Journal of the Acoustical Society of America 149 (4), 2926-2935, 2021 | 22 | 2021 |
Predicting and Explaining Cyber Ethics with Ethical Theories W Yaokumah International Journal of Cyber Warfare and Terrorism (IJCWT) 10 (2), 46-63, 2020 | 14 | 2020 |
Identifying HRM Practices for Improving Information Security Performance: An Importance-Performance Map Analysis P Kumah, W Yaokumah, C Buabeng-Andoh International Journal of Human Capital and Information Technology …, 2018 | 14* | 2018 |
A Systematic Review of Fingerprint Recognition Systems Development JK Appati, W Yaokumah International Journal of Software Science and Computational Intelligence …, 2022 | 11 | 2022 |
Integrated Financial Management Information System Project Implementation in Ghana Government Ministries W Yaokmah, E Biney International Journal of Information Technology Project Management (IJITPM …, 2020 | 11 | 2020 |
A Conceptual Model and Empirical Assessment of HR Security Risk Management P Kumah, W Yaokumah, E Okai Information and Computer Security 27 (3), 411–433, 2019 | 11 | 2019 |
Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations: A Case of Ghana W Yaokumah International Journal of IT/Business Alignment and Governance (IJITBAG) 4 (1 …, 2013 | 11 | 2013 |
Critical Success Factors of Strategic Information Systems Planning: A Delphi Approach W Yaokumah, B Omane-Antwi, K Asante-Offei Kybernetes, https://doi.org/10.1108/K-05-2021-0370, 2022 | 10 | 2022 |
Cyber-Identity Theft and FinTech Services: Technology Threat Avoidance Perspective KO Asante-Offei, W Yaokumah Journal of Information Technology Research (JITR) 14 (3), 1-19, 2021 | 10 | 2021 |
Modern Theories and Practices for Cyber Ethics and Security Compliance W Yaokumah, M Rajarajan, JD Abdulai, I Wiafe, FA Katsriku IGI Global 1, 1-302, 2020 | 10 | 2020 |
Students’ Intentions on Cyber Ethics Issues I Wiafe, W Yaokumah, FA Kissi Modern Theories and Practices for Cyber Ethics and Security Compliance 1 …, 2020 | 8 | 2020 |